例如,可在第1层执行基域覆盖策略、用户鉴别策略以及基站配置策略等。
For instance, the policies for basic field coverage, users' authentication and base station configurations can be enforced at Layer 1.
鉴别并捕捉非法用户。
软件鉴别这些证书,在鉴定通过的基础上允许用户访问那些他们有权限访问软件的功能部件。
Software shall authenticate these credentials and upon authentication shall permit the users to access sections of the software that they have access privileges for.
这是网关用于鉴别用户的重要信息。
This information is vital for the gateway to authenticate the user.
可信的证书权威机构发布数字证书,它们被用来鉴别用户和组织访问Web站点,e - mail服务器和其他安全系统的权限。
Trusted certificate authorities issue digital certificates, which are then used to authenticate users and organizations for access to Web sites, E-mail servers, and other secure systems.
用户可以拍下当地鸟类、植物、树木和其他生物的照片,然后对该生物进行鉴别,或者把鉴定工作留给其他人完成。
Users snap photos of local birds, plants, trees, and other species, and can either identify the organism or leave the classification up to the crowd.
从本质上讲,苹果的专利使设备能够鉴别用户的身份,显式确定是否及何时该用户是“未经授权的”,或者,换句话说,该设备被盗了。
Essentially, Apple's patent provides for a device to investigate a user's identity, ostensibly to determine if and when that user is "unauthorized," or, in other words, stolen.
那作为并非防爆系统专业人士的普通用户,他怎么样才能够从中进行鉴别挑选呢?
Then, as a normal user that has no knowledge of explosion protection system, how can he select a good product from the bad ones?
用户要求机密性、消息完整性、发方鉴别和收方不可抵赖。
Users require confidentiality, message integrity, sender authentication and receiver non - repudiation.
为了设计一种交叉域访问控制(XDAC)系统模型,采用了一种利用公钥证书鉴别用户的PK I方法。
In order to design a prototype for the cross-domain access control (XDAC) system, a PKI approach is used, in which users are identified by using public key certificates.
七号信令鉴权系统是针对于通信用户在不同的通信网间的使用权限的鉴别系统。
SS7 is the identification system which aims at the authority identification of communication users corresponding in different communication net.
该方案最大的特点是公开了水印识别器,允许最终用户以验证者的身份鉴别软件作品的可靠性和真实性。
The most important feature is to open the water recognizer, which allows the end user as a verifier to identify the reliability and the true copyright author of the software work.
常采用的数据保护技术有用户身份鉴别、计算机数据加密技术、数字签名技术等。
User ID authentication, data encryption and digital signature are the three common technologies for data protection.
智能卡应用系统实现用户的鉴别和电子票据功能,结合基于POS的支付,为各类交易服务提供了安全保障。
This smart card application system can verify customers and has the function of electronic check. Combined with POS payment, it ensures many transactions.
该方案对于不同权限级别的用户,采用分级的身份鉴别技术,充分保证了账户的移动性和访问的安全性。
This scheme use different authentication mechanism to authenticate users of different level to ensure the mobility and security of user account.
本文首先介绍了基于击键特征的身份鉴别系统的设计,该系统包括数据采集、数据预处理与分析、用户管理等多个层次。
The thesis firstly presents the overall identity authentication system design, including the levels of data acquisition, data preprocessing, data analysis, and user management.
识别用于区分不同的用户,认证用于鉴别用户的身份。
The former is used to differentiate user and the latter to authenticate the use's identity.
提出了一个安全的动态口令鉴别(认证)方案(SDPA),该方案适合于不安全的网络信道上鉴别用户身分。
Authors propose a new secure dynamic password authentication (SDPA) scheme suitable for authenticating users over an untrusted network.
使用独特的物理特征,例如指纹、声音模式,或视网膜扫描来鉴别一个用户,为工作站或存储子硬盘的信息提供安全保证。
The use of unique physical characteristics, such as fingerprints, voice patterns, or retinal scan, to authenticate a user; providing security for workstations or information stored in hard drive.
身份验证,就是用户进入信息系统时,系统必须对用户进行身份的合法性鉴别认证,防止非法用户进入系统。
Authentication is, when users log in information system, the system must authenticate the users 'legal status in order to prevent illegal users 'login.
“生命周期”是指从用户需求开始的一系列过程,包括设计,完成,鉴别,鉴定和维护,直到不再使用为止。
"Life cycle" means the process starting with the user requirements, continues through design, realisation, qualification, process validation and maintenance until the stadium of not in use.
用户安全模型使用消息鉴别码、加密和时间戳保护网管消息的传输安全。
Through MAC, encryption and timestamp, USM protects management messages from communication threats.
用户安全模型使用消息鉴别码、加密和时间戳保护网管消息的传输安全。
Through MAC, encryption and timestamp, USM protects management messages from communication threats.
应用推荐